In this research we investigated the corrosion behavior of the commertialy pure titanium and Ti-6Al-4V alloy that coated with hydroxyapatite by electrochemical deposition with applied voltage (6,9,12) Volt from aqueous solution containing Ca(NO3)2.H2O =7.0 gm/l , (NH4)2HPO4 =3.5 gm/l , Na(NO3)2 = 8.5 gm/l in order to improve the bonding strength of hydroxyapetite and medical metals and alloys and increasing the biocompatibility. The coating layer morphology was investigated by XRD, Optical microscope , and SEM tests, the corrosio tests was made by use senthesys simulated body fluid (SBF) , and we found that the propreate voltage for coatint on Ti was 9 Volt and for Ti-6Al-4Vwas12Volt.
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreWorld statistics declare that aging has direct correlations with more and more health problems with comorbid conditions. As healthcare communities evolve with a massive amount of data at a faster pace, it is essential to predict, assist, and prevent diseases at the right time, especially for elders. Similarly, many researchers have discussed that elders suffer extensively due to chronic health conditions. This work was performed to review literature studies on prediction systems for various chronic illnesses of elderly people. Most of the reviewed papers proposed machine learning prediction models combined with, or without, other related intelligence techniques for chronic disease detection of elderly patie
... Show MoreThis article contains a new generalizations of Ϻ-hyponormal operators which is namely (Ϻ,θ)-hyponormal operator define on Hilbert space H. Furthermore, we investigate some properties of this concept such as the product and sum of two (Ϻ, θ)-hyponormal operators, At the end the operator equation where , has been used for getting several characterization of (Ϻ,θ)-hyponormal operators.
Autonomous motion planning is important area of robotics research. This type of planning relieves human operator from tedious job of motion planning. This reduces the possibility of human error and increase efficiency of whole process.
This research presents a new algorithm to plan path for autonomous mobile robot based on image processing techniques by using wireless camera that provides the desired image for the unknown environment . The proposed algorithm is applied on this image to obtain a optimal path for the robot. It is based on the observation and analysis of the obstacles that lying in the straight path between the start and the goal point by detecting these obstacles, analyzing and studying their shapes, positions and
... Show MoreAbstract
The common types of movement disorders are ; dystonia which is a syndrome of repetitive muscle contractions. While , Huntington disease is autosomal dominant progressive neurodegenerative disorder, which is characterized by involuntary movements (“chorea”).
Tetrabenazine therapy has been shown to effectively control this movements compared with placebo.
Design the proper dosing approach for patients treated with tetrabenazine with genotype polymorphisms and their hepatic effect on patients.
A prospective case controlled study was carried on 50 patients whom divided into 2 groups :first group involved 25 patients who had cho
... Show MoreMany fuzzy clustering are based on within-cluster scatter with a compactness measure , but in this paper explaining new fuzzy clustering method which depend on within-cluster scatter with a compactness measure and between-cluster scatter with a separation measure called the fuzzy compactness and separation (FCS). The fuzzy linear discriminant analysis (FLDA) based on within-cluster scatter matrix and between-cluster scatter matrix . Then two fuzzy scattering matrices in the objective function assure the compactness between data elements and cluster centers .To test the optimal number of clusters using validation clustering method is discuss .After that an illustrate example are applied.
In this study, the concept of fuzzy α-topological vector space is introduced by using the concept fuzzy α-open set , some properties of fuzzy α-topological vector spaces are proved .We also show that the space is -space iff every singleton set is fuzzy α- closed .Finally, the convex property and its relation with the interior points are discussed.